Review of Web Structure Mining Techniques using Clustering and Ranking Algorithms
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 6
Abstract
Today, Web mining plays very important role. It discovers and extract information from web services and documents. In this paper we focus on the web structure mining techniques which are used to extract the rich information from web pages. User can retrieve information in the form of text, hyperlinks, images, audio, videos and image links. There are a lot of irrelevant data present on the webpage and ranking algorithms provide the relevant data which the users want. Furthermore, Clustering approach is used to group the data into clusters and used with ranking algorithms to improve the efficiency and relevancy of data. Most of the search engines rely on the ranking algorithms instead of old approach as Support Vector Machines to improve the execution time. In this paper, we survey the existing work of link mining algorithms and clustering techniques which provide the rich data to the users.
Authors and Affiliations
Rashmi Sharma, Kamaljit Kaur
NFC: A review of technology, tags, applications and security
Smart phones are on a course to becoming a need instead of just a want as users are integrating the devices into every aspect of their lives. Smart phones adoption also increases due to the convergence of value-added...
Secured Architecture To Access Cloud Based Services
Cloud computing is new software IT revolution refers to the delivery of computer resources over the internet. Cloud storage is about much more than hosting online media. You need to deliver online media content, such...
Vigorous Source Apportionment via Simulated Technologies for Cloud Computing Environment
Dynamic resource allocation is very much popular research area in cloud environment due to its live application in data center.Becasue of dynamic and heterogeneous nature of cloud, allocation of virtual machine is af...
Finger Vein Based User Identification Using Differential Box Counting
The personal information can be protected in the form of biometrics which uses human physiological or behavioural features for personal identification. Finger vein ID is a biometric authentication system that matches...
A method to predict the offloading potential for DTN and WIFI hotspots
An enormous amount of cellular data traffic has been produced by mobile users which exceeds the capacity of cellular network and hence weaken the network quality. The solution is to enhance the capacity of cellular n...